Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (17)

linux-source-4.15.0

Hashes
Linux kernel source for version 4.15.0 with Ubuntu patches This package provides the source code for the Linux kernel version 4.15.0. This package is mainly meant for other packages to use, in order to build custom flavours. If you wish to use this package to create a custom Linux kernel, then it is suggested that you investigate the package kernel-package, which has been designed to ease the task of creating kernel image packages. If you are simply trying to build third-party modules for your kernel, you do not want this package. Install the appropriate linux-headers package instead.
  • SHA256: 531d834ef4178c01b45970cda24411d5dd0efc63a7e74f9c67e03f52c0624e72
  • SHA1: 41dee7db34b72fdebea41034921548b2534965a4
  • MD5: 7de61c3cd57913c677e5e1078dc42217
Information
  • Version: 4.15.0-197.208
  • Filename: linux-source-4.15.0_4.15.0-197.208_all.deb
  • Size: 143558
  • Type: DEB
  • Source: linux
  • Architecture: ALL
  • Owner: Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>
  • Dependencies: binutils, bzip2, coreutils

Applications

NameTypeArchSizeRisk
fix-filenames
/usr/src/linux-source-4.15.0/debian/scripts/fix-filenames
129520

Vulnerabilities

NameRiskSourceFixed
CVE-2022-359475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-4270355USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356671USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356480USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356771USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-36218USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-352475USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-356580USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-323978USN
linux-source-4.15.0
4.15.0-200.211
CVE-2022-306155USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-3918847USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-358655USN
linux-source-4.15.0
4.15.0-201.212
CVE-2021-415944USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-2042178USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-4030747USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-40958USN
linux-source-4.15.0
4.15.0-201.212
CVE-2022-46620USN
linux-source-4.15.0
4.15.0-201.212

Raw Object

{
  "sha256": "531d834ef4178c01b45970cda24411d5dd0efc63a7e74f9c67e03f52c0624e72",
  "sha1": "41dee7db34b72fdebea41034921548b2534965a4",
  "md5": "7de61c3cd57913c677e5e1078dc42217",
  "type": "DEB",
  "arch": "ALL",
  "name": "linux-source-4.15.0",
  "filename": "linux-source-4.15.0_4.15.0-197.208_all.deb",
  "size": 143558,
  "description": "Linux kernel source for version 4.15.0 with Ubuntu patches\nThis package provides the source code for the Linux kernel version\n4.15.0.\n\nThis package is mainly meant for other packages to use, in order to build\ncustom flavours.\n\nIf you wish to use this package to create a custom Linux kernel, then it\nis suggested that you investigate the package kernel-package, which has\nbeen designed to ease the task of creating kernel image packages.\n\nIf you are simply trying to build third-party modules for your kernel,\nyou do not want this package. Install the appropriate linux-headers\npackage instead.",
  "url": null,
  "version": "4.15.0-197.208",
  "source": "linux",
  "owner": "Ubuntu Kernel Team <kernel-team@lists.ubuntu.com>",
  "dependencies": "binutils, bzip2, coreutils",
  "applications": [
    {
      "path": "/usr/src/linux-source-4.15.0/debian/scripts/fix-filenames",
      "sha256": "03c9f560cafab4f2b53375df1d3e02198bb63c3a0e444440b5678ac2e29d5438",
      "sha1": "1dbefd27dbf65251176aa8cd98ae3b159202ccf5",
      "md5": "c7dd180d77b8447906f3fdd91b236714",
      "name": "fix-filenames",
      "size": 12952,
      "description": null,
      "package": 4870180,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-11-06T11:01:31+00:00",
      "updated_at": "2022-11-06T11:01:31+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-3594",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:23:19+00:00",
      "updated_at": "2022-12-02T12:23:19+00:00"
    },
    {
      "name": "CVE-2022-42703",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:39:33+00:00",
      "updated_at": "2022-12-02T12:39:33+00:00"
    },
    {
      "name": "CVE-2022-3566",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:41:25+00:00",
      "updated_at": "2022-12-02T12:41:25+00:00"
    },
    {
      "name": "CVE-2022-3564",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:10+00:00",
      "updated_at": "2022-12-02T12:42:10+00:00"
    },
    {
      "name": "CVE-2022-3567",
      "risk": 71,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:42:58+00:00",
      "updated_at": "2022-12-02T12:42:58+00:00"
    },
    {
      "name": "CVE-2022-3621",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:44:04+00:00",
      "updated_at": "2022-12-02T12:44:04+00:00"
    },
    {
      "name": "CVE-2022-3524",
      "risk": 75,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:45:27+00:00",
      "updated_at": "2022-12-02T12:45:27+00:00"
    },
    {
      "name": "CVE-2022-3565",
      "risk": 80,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:10+00:00",
      "updated_at": "2022-12-02T12:46:10+00:00"
    },
    {
      "name": "CVE-2022-3239",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "b386da4f83b46369b9b90a381c0a15c5b62c30b4971c164829ec7cfb86f7cdce",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-200.211",
        "filename": "linux-source-4.15.0_4.15.0-200.211_all.deb"
      },
      "created_at": "2022-12-02T12:46:50+00:00",
      "updated_at": "2022-12-02T12:46:50+00:00"
    },
    {
      "name": "CVE-2022-3061",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T13:00:54+00:00",
      "updated_at": "2023-01-07T13:00:54+00:00"
    },
    {
      "name": "CVE-2022-39188",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T13:43:50+00:00",
      "updated_at": "2023-01-07T13:43:50+00:00"
    },
    {
      "name": "CVE-2022-3586",
      "risk": 55,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:23:01+00:00",
      "updated_at": "2023-01-07T14:23:01+00:00"
    },
    {
      "name": "CVE-2021-4159",
      "risk": 44,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:41:24+00:00",
      "updated_at": "2023-01-07T14:41:24+00:00"
    },
    {
      "name": "CVE-2022-20421",
      "risk": 78,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T14:49:50+00:00",
      "updated_at": "2023-01-07T14:49:50+00:00"
    },
    {
      "name": "CVE-2022-40307",
      "risk": 47,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T15:08:23+00:00",
      "updated_at": "2023-01-07T15:08:23+00:00"
    },
    {
      "name": "CVE-2022-4095",
      "risk": 8,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-01-07T15:37:16+00:00",
      "updated_at": "2023-01-07T15:37:16+00:00"
    },
    {
      "name": "CVE-2022-4662",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "7030a6dbbce3c5071ebaad3b5d079dd7fc3a5d37028e00edebabbe1ebf0ffc3b",
        "name": "linux-source-4.15.0",
        "version": "4.15.0-201.212",
        "filename": "linux-source-4.15.0_4.15.0-201.212_all.deb"
      },
      "created_at": "2023-02-18T11:45:53+00:00",
      "updated_at": "2023-02-18T11:45:53+00:00"
    }
  ],
  "risk": 80,
  "vulnerable": 80,
  "outdated": 80,
  "malicious": 0,
  "created_at": "2022-11-01T19:20:51+00:00",
  "updated_at": "2022-11-06T11:01:27+00:00",
  "deleted_at": null
}